top of page
  • Writer's pictureChevvy Montana

The GCash Hacked Incident: An In-depth Analysis

The recent incident of GCash hacked transactions, which took place on May 8, 2023, has sparked a wave of concern among its users. Herein, we dig deep into the incident to unveil the truth behind the unauthorized transactions and the preventive measures taken by GCash to safeguard its users.

Gcash hacked

Table of Contents

  1. Introduction

  2. Official Statement from GCash

  3. The Role of Regulators

  4. Phishing Attempt: The Modus Operandi

  5. Preventive Security Measures

  6. GCash's Commitment to Cybersecurity

  7. Collaboration with Authorities

  8. GCash's User Advisory

  9. The Role of Banks

  10. Unresolved Questions


The recent GCash hacked episode has been a topic of hot discussion in the fintech industry. The unauthorized transactions that occurred on May 8, 2023, left users baffled and worried. However, GCash has now come forward with an explanation, debunking any claims of a system glitch or hacking.

Official Statement from GCash Hacked

GCash, in its official statement, clarified that there was no hacking or glitch in its platform. The incident, as it turns out, was a calculated phishing attempt that occurred outside the GCash application. Some users were lured into divulging their personal information to fraudulent sites masquerading as legitimate brands.

The Role of Regulators

In response to the GCash hacked incident, the company has been actively coordinating with regulatory bodies such as the Bangko Sentral ng Pilipinas (BSP) and the National Privacy Commission (NPC). GCash has been diligent in providing the necessary information required by these authorities.

Phishing Attempt: The Modus Operandi

The phishing attempt was a carefully planned operation that exploited the naivety of some users. The fraudsters created replicas of legitimate brands or institutions and tricked the users into sharing their confidential information. Once the fraudsters had the necessary credentials, they executed the unauthorized transactions outside of the GCash application.

Preventive Security Measures

Upon the detection of these unusual transactions, GCash immediately activated its security protocols and implemented preventive measures. This prompt action helped mitigate the impact on the customers, allowing GCash to restore the affected e-wallet balances within 24 hours.

GCash's Commitment to Cybersecurity

GCash has always been committed to maintaining global cybersecurity standards. The company continues to invest in the latest cybersecurity technologies and capabilities to ensure the protection of its customers' funds and data.

Collaboration with Authorities

GCash is working in close collaboration with the Philippine National Police Anti-Cybercrime Group (PNP-ACG), the Cybercrime Investigation and Coordinating Center (CICC), and the National Bureau of Investigation (NBI). These joint efforts are directed towards catching the fraudsters and scammers.

GCash's User Advisory

GCash has always prioritized the safety and security of its customers. In light of the recent GCash hacked incident, the company has urged its users to transact only through official channels. They have also been reminded that GCash never sends personal messages asking for MPIN, OTP, or any other personal information.

The Role of Banks

In this incident, funds were transferred from GCash accounts to two bank accounts associated with East West Bank and the Asia United Bank (AUB). Both banks acted promptly by freezing the accounts once they were alerted by GCash.

Unresolved Questions

While the GCash hacked incident has been contained, certain questions remain. The exact source of the credentials is still unclear. It could have been a fake website or a third-party application. The identity of the perpetrators behind this attempt is also yet to be determined.


The GCash hacked incident is a stark reminder of the rising threat of cybercrime. Staying vigilant and transacting through trusted channels can go a long way in safeguarding our financial and personal information.

14 views0 comments
bottom of page